Syrian Electronic Army claim they got access to the blogs.office.com admin panel

After hijacking several of Microsoft's Twitter accounts and compromising its official blog over the past two weeks, the Syrian Electronic Army hacked into the Microsoft Office Blogs site Monday.

The Syrian Electronic Army (SEA) posted a screenshot on Twitter of the Microsoft Office Blogs site with a rogue article titled "Hacked by the Syrian Electronic Army." The article has since been removed from the site, but is still visible in Google's cache.

The screenshots seem to suggest SEA had access to the site before and after the CMS (content management system) switch and support the group's previous claims that it had access to various Microsoft employee accounts.

"Dear @Microsoft, Changing the CMS will not help you if your employees are hacked and they don't know about that," the hacker group said Monday on Twitter.

"A social engineering cyberattack method known as phishing resulted in a small number of Microsoft employee social media and email accounts being impacted," a Microsoft representative said Thursday via email. "These accounts were reset and no customer information was compromised. We continue to take a number of actions to protect our employees and accounts against this industry-wide issue."

The new compromise of the Office Blogs site suggests SEA still has access to some Microsoft employee access credentials that haven't been changed.

"A targeted cyberattack temporarily affected the Microsoft Office blog and the account was reset," a Microsoft representative said Tuesday in an emailed statement. "We can confirm that no customer information was compromised."

SEA is a group of hackers who in the past declared their loyalty to the government of Syrian President Bashar al-Assad. The group has targeted various media organizations, including The New York Times, Financial Times, the Associated Press, The Guardian, BBC and Al Jazeera. Its primary technique for breaking into Twitter accounts and websites is social engineering, primarily phishing.